So after a dozen years or so organizing conferences, you
get the urge to pull levers and try experimenting with
things. So this year I sent out the CanSecWest CFP
only over Twitter, and G+ publicly. Just curious as to the
adoption and information dispersion rate, and some
estimate of the attent

I have an idea to share with you guys to know whether it can be implemented or not?

Idea is, people write exploits for discovered public vulnerabilities, and infect target system which is not yet patched. If vendor release patch and client install released vendor patch or third party,

I see what you mean. That's very interesting. So a bad guy can eventually
sign up on mailing lists and get genuine email addresses for spamming. Not
to mention it's a cakewalk to automate the entire process. Baah. And that's
exactly what's happening. It's true that cached threads mask the email but

I was using Arco Browser to look at globalsecurity.org a few days ago
and after 2 redirects got a forced download. While I don't know if it
was malign or not, I deleted all cookies from that time, including Java,
and uninstalled Arco. (I had it set supposedly to block such things.) I
have not ha

not in the slightest. i have only insulted you (and the geek squad). ethical persons and companies charge a reasonable rate for the time they put in. you are like the person that runs a nessus scan at the absolute highest logging rate and gives the customer a two inch thick printout and calls it